Sciweavers

5722 search results - page 253 / 1145
» Security Function Interactions
Sort
View
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
ESORICS
2007
Springer
15 years 9 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
VIZSEC
2007
Springer
15 years 9 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
KER
2006
70views more  KER 2006»
15 years 3 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
ACSAC
2010
IEEE
15 years 1 months ago
A framework for testing hardware-software security architectures
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...